RBAC & Audit.
Control who can do what within your organization, and maintain a complete, tamper-evident record of every action taken on the platform. Truthlocks RBAC ensures that the right people have the right access — nothing more, nothing less.
How RBAC Works
Role-Based Access Control (RBAC) means each team member is assigned a role that defines exactly what they can see and do. Instead of giving everyone full admin access, you give each person the minimum permissions they need to do their job.
Owner
- Full administrative access
- Manage billing and subscriptions
- Invite and remove team members
- Configure governance policies
- Delete issuers and attestations
Admin
- Create and manage issuers
- Manage API keys
- Configure webhooks
- View audit logs
- Rotate signing keys
Operator
- Mint and revoke attestations
- View issuer details
- Use API keys (cannot create)
- View own activity log
- Cannot modify settings
Viewer
- Read-only access to dashboard
- View attestation status
- View issuer information
- Cannot create or modify anything
- Ideal for compliance officers
Access Control Capabilities
Team Management
Invite team members via email with specific roles. Remove access instantly when someone leaves the organization. Manage permissions from the Console or via the API.
Least Privilege Enforcement
The platform enforces role boundaries at the API level. An Operator cannot escalate to Admin permissions, and a Viewer cannot modify resources — even through the API.
Governance Workflows
For sensitive operations like key rotation, issuer deletion, or bulk revocation, require multi-party approval from designated governance reviewers before execution.
API Key Scoping
API keys can be scoped to specific permissions and issuers. A key created for minting cannot be used to revoke attestations or modify settings.
Session & Token Management
Configure session timeout policies, enforce re-authentication for sensitive actions, and revoke active sessions for any team member instantly.
SSO & SCIM Integration
Enterprise customers can integrate with SAML/OIDC single sign-on providers and use SCIM for automated user provisioning and deprovisioning from your identity provider.
Comprehensive
Audit Logging
Every action on the Truthlocks platform is recorded in a tamper-evident audit log. Unlike traditional application logs, Truthlocks audit events are cryptographically chained using SHA-256 hashes — if any entry is modified or deleted, the chain breaks and the tampering is immediately detectable.
Audit logs are designed for compliance teams, security officers, and regulators who need to understand exactly who did what, when, and from where.
What Gets Logged
Authentication Events
Login, logout, failed attempts, session creation, API key usage
Attestation Operations
Mint, revoke, supersede, verify — with full request context
Team Changes
Member invited, role changed, member removed, permissions updated
Key Lifecycle
Key generated, rotated, compromised, retired — linked to affected attestations
Configuration Changes
Webhook updated, API key created/revoked, governance policy modified
Governance Actions
Approval request created, approved, rejected, executed
Built for Compliance
RBAC and audit logging work together to satisfy the access control and record-keeping requirements of major compliance frameworks.
SOC 2
Access control, logging, monitoring
GDPR
Data access audit, right to access
HIPAA
Access logs, minimum necessary
ISO 27001
A.9 Access control, A.12 Operations
Every Action.
Every User. Accounted For.
Start enforcing granular access control and maintaining tamper-evident audit trails across your entire organization.
